Deck 12: Developing an Excel Application

ملء الشاشة (f)
exit full mode
سؤال
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A) Throw old computers away at the dump.
B) Get the latest smartphone when it is released.
C) Buy devices with high power consumption.
D) Shut down your computer overnight.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A) Create documents in Microsoft Office apps and save them in HTML.
B) Use a search engine optimization tool to write the code for publication.
C) Contract with a vendor to use uptime for a true measure of your coding skills.
D) Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
سؤال
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A) Chrome
B) Google Docs
C) Excel
D) Fotor
سؤال
Which of the following statements is NOT true about network standards?

A) The way computers access a network is related to the network standard.
B) Network standards specify the type(s) of hardware used.
C) Data transmission speeds are specified by the network standard.
D) Computers and devices successfully communicate on networks regardless of the standards used.
سؤال
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A) Yahoo
B) Gmail
C) Encyclopedia Britannica
D) Wikipedia
سؤال
A cloud server can be used to back up your data.
سؤال
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
سؤال
In which phase of the software development life cycle are the necessary hardware and programming languages/tools acquired?

A) Planning
B) Implementation
C) Design
D) Support and security
سؤال
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
سؤال
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A) Malware
B) Trojans
C) Cyberbullying
D) Social engineering
سؤال
Bernie is an aspiring video game developer. Learning which of the following software(s) would benefit him the most?

A) Computer-aided design software
B) Sampling software
C) Augmented reality software
D) System software
سؤال
A scanner is a type of computer hardware.
سؤال
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
سؤال
Every program or app requires RAM, which is the volatile and temporary storages for open apps and data.
سؤال
Development is the process of creating programs and apps from idea stage to distribution to users.
سؤال
Speech recognition software allows a device like a laptop or smartphone to recognize the user's voice.
سؤال
The direction in which text is printed on a page is called style.
سؤال
How many different types of operating systems are there?

A) five
B) four
C) two
D) three
سؤال
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of the larger umbrella of Google.
سؤال
Which of the following is not a computer hardware?

A) Printer
B) Device driver
C) Mouse
D) Central processing unit
سؤال
Which of the following is true about video conferences?

A) A video conference involves only one-way communication.
B) A video conference opens with an About page that includes directions, an agenda, and a poll.
C) A video conference always allows participants to see and hear each other.
D) A video conference is easily identifiable by its domain name and provider.
سؤال
The practice of social curation is when a website provides links to other relevant websites in its field.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Developing an Excel Application
1
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A) Throw old computers away at the dump.
B) Get the latest smartphone when it is released.
C) Buy devices with high power consumption.
D) Shut down your computer overnight.
D
2
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A) Create documents in Microsoft Office apps and save them in HTML.
B) Use a search engine optimization tool to write the code for publication.
C) Contract with a vendor to use uptime for a true measure of your coding skills.
D) Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
A
3
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A) Chrome
B) Google Docs
C) Excel
D) Fotor
D
4
Which of the following statements is NOT true about network standards?

A) The way computers access a network is related to the network standard.
B) Network standards specify the type(s) of hardware used.
C) Data transmission speeds are specified by the network standard.
D) Computers and devices successfully communicate on networks regardless of the standards used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
5
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A) Yahoo
B) Gmail
C) Encyclopedia Britannica
D) Wikipedia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
6
A cloud server can be used to back up your data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
7
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
8
In which phase of the software development life cycle are the necessary hardware and programming languages/tools acquired?

A) Planning
B) Implementation
C) Design
D) Support and security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
9
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
10
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A) Malware
B) Trojans
C) Cyberbullying
D) Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
11
Bernie is an aspiring video game developer. Learning which of the following software(s) would benefit him the most?

A) Computer-aided design software
B) Sampling software
C) Augmented reality software
D) System software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
12
A scanner is a type of computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
13
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
14
Every program or app requires RAM, which is the volatile and temporary storages for open apps and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
15
Development is the process of creating programs and apps from idea stage to distribution to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
16
Speech recognition software allows a device like a laptop or smartphone to recognize the user's voice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
17
The direction in which text is printed on a page is called style.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
18
How many different types of operating systems are there?

A) five
B) four
C) two
D) three
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
19
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of the larger umbrella of Google.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not a computer hardware?

A) Printer
B) Device driver
C) Mouse
D) Central processing unit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is true about video conferences?

A) A video conference involves only one-way communication.
B) A video conference opens with an About page that includes directions, an agenda, and a poll.
C) A video conference always allows participants to see and hear each other.
D) A video conference is easily identifiable by its domain name and provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
22
The practice of social curation is when a website provides links to other relevant websites in its field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.